On Mon, 2009-08-31 at 12:13 -0800, Kevin Miller wrote:
> I'm seeing a lot of blowback from Russian servers due to my domain
> users being joe-jobbed.
>
If you're not scanning outgoing mail or mail that doesn't cross the
domain boundary, then its reasonable to simply bin anything that claims
to be from your domain. Since it didn't originate in your domain the
sender must be forged. 
  
> I'm writing a rule to check (among other things) the From: address.
>
Your MTA can probably deal with that without involving SA, but if you
want to involve SA, then 

describe LOC_FORGED Message with a forged sender
header   LOC_FORGED From ~= /\.example\.com/m
score    LOC_FORGED 10.0

should do the trick. Of course, if you also scan outbound and/or
intra-domain mail then things get a little trickier...

I access my mail archive via a plugin and whitelisting rule that
whitelists mail from all senders who:
- have previously been sent mail from my domain
- are not recorded in the archive as users within my domain

Any sender who passes this check is assigned a score of -50.0 by the
whitelisting rule.

As a result I can be quite vicious with spam detection rules without
impacting mail from such correspondents.

I hope this gives you ideas about similar approaches. Its working well
here.


Martin


Reply via email to